Ch06-TB-BLTE-8e

Ch06-TB-BLTE-8e - Chapter6 CriminalLawandCyberCrimes...

Info iconThis preview shows pages 1–4. Sign up to view the full content.

View Full Document Right Arrow Icon
Chapter 6 Criminal Law and Cyber Crimes TRUE/FALSE QUESTIONS 1. The prosecution in a criminal case need only establish by a preponderance  of the evidence that the defendant committed the crime. ANSWER: F PAGE: 172 TYPE: = MISC: AACSB Analytic Skill Level: AICPA Legal 2. At a criminal trial, the burden of proof is on an accused person to prove his  or her innocence. ANSWER: F PAGE: 172 TYPE: N MISC: AACSB Analytic Skill Level: AICPA Legal 3. Only public officials prosecute criminal defendants. ANSWER: T PAGE: 172 TYPE: = MISC: AACSB Analytic Skill Level: AICPA Legal 4. Criminal liability depends on the commission or omission of an act. ANSWER: T PAGE: 173 TYPE: + MISC: AACSB Analytic Skill Level: AICPA Legal 81
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
82 TEST BANK TO ACCOMPANY BUSINESS LAW TODAY: THE ESSENTIALS 5. Criminal liability depends on a specific state of mind or intent. ANSWER: T PAGE: 173 TYPE: + MISC: AACSB Analytic Skill Level: AICPA Legal 6. If a person does not know that he or she is taking the property of someone  else, the person cannot be convicted of theft. ANSWER: T PAGE: 173 TYPE: N MISC: AACSB Reflective Skill Level: AICPA Legal 7. Larceny relies on stealth while robbery relies on fear and force. ANSWER: T PAGE: 176 TYPE: + MISC: AACSB Analytic Skill Level: AICPA Critical  Thinking 8. Obtaining another person’s phone card number so that it may be used to  make unauthorized long-distance calls is theft. ANSWER: T PAGE: 176 TYPE: = MISC: AACSB Reflective Skill Level: AICPA Legal 9. Stealing computer time is  not  a crime. ANSWER: F PAGE: 176 TYPE: = MISC: AACSB Reflective Skill Level: AICPA Legal 10. Counterfeiting is forgery. ANSWER: T PAGE: 176 TYPE: N MISC: AACSB Reflective Skill Level: AICPA Legal
Background image of page 2
CHAPTER 6: CRIMINAL LAW AND CYBER CRIMES 83 11. The recipient of stolen goods who does not know the identity of the owner or  the thief has a defense to criminal liability. ANSWER: F PAGE: 176 TYPE: = MISC: AACSB Analytic Skill Level: AICPA Legal 12. Crimes occurring in a business context are popularly referred to as blue- collar crime. ANSWER: F PAGE: 177 TYPE: N MISC: AACSB Reflective Skill Level: AICPA Legal 13. Embezzlement is like robbery in that neither crime requires the use of force  or fear. ANSWER: F PAGE: 177 TYPE: N MISC: AACSB Analytic Skill Level: AICPA Critical  Thinking 14. Embezzlement can be committed only by physically taking property from  the possession of another. ANSWER: F PAGE: 177 TYPE: = MISC: AACSB Analytic Skill Level: AICPA Legal 15. It is a sufficient defense to a charge of embezzlement that the embezzler  intended to return the embezzled property eventually. ANSWER:
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 4
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 11/03/2009 for the course ARE 18 taught by Professor Maxey during the Spring '08 term at UC Davis.

Page1 / 26

Ch06-TB-BLTE-8e - Chapter6 CriminalLawandCyberCrimes...

This preview shows document pages 1 - 4. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online